Computer Support Blog

Please enter a valid ZIP code.

Tech Support Blog

Tech Support Blog

Facebook for College Professors: The Ten Commandments

We’ve searched the web for articles, blogs, and lengthy school policies on how professors should use Facebook and created a condensed version of the multitude of those tips. Here are the Rescuecom Ten Commandments of Facebook for College Professors (violate them at your own risk):

1)   Thou shalt never, ever, send a friend request to an undergraduate student still enrolled at your institution. Almost every online resource that provides information of Facebook ethics for academics insists on this point. It’s by far the most important rule, so please abide by it.

2)   Thou shalt accept student friend requests consistently. That is to say, either accept all requests from your students or accept none. Picking and choosing is a blatant display of favoritism, not to mention an easy way to get a zero on the “Instructor is impartial” question on your evaluation. (Nota bene, this doesn’t apply to students who have graduated. Once they’re out, feel free to reject and accept as you please.)

3)   Thou shalt not comment on your students’ photos, especially embarrassing ones. Remember that you need to maintain formality, even when Facebook tries to do away with whatever formality is left.

4)   Thou shalt not poke your students. No one likes pokes. They’re annoying and awkward. Imagine how awkward they are when they come from a professor.

5)   Thou shalt be friendly and encouraging—albeit proper—when students share links with you or write on your wall.

6)   Thou shalt not post anything you wouldn’t share with your students in person. Make sure you adjust your Facebook Internet security settings to limit what students can see.

7)   Thou shalt not use your students’ profiles against them. When a student emails you with an excuse for missing class, don’t snoop around his or her profile to check the claim. That’s just creepy and cumbersome.

8)   Thou shalt maintain an academic and professional tone to your Facebook—be an example to your students.

9)   Thou shalt not post class material, syllabi, grades, or announcements on Facebook. Even if you are Facebook friends with every single one of your students, Facebook is still not a reliable way to make announcements because it lacks formality. Also, do you really want to give your students yet another excuse to be on Facebook.

10)  Thou shalt not use social network services like Facebook in place of email communication. Email correspondence, once again, is infinitely more formal than Facebook correspondence—and you want to keep communication serious and academic. Besides, email can provide you with official records of correspondence if you ever need them. Imagine how odd it would look if you were to use Facebook transcripts in a plagiarism hearing, for instance.

It may be unfair to place so many restrictions on how professors and educators use Facebook, but it’s just another job hazard. Sorry, professors.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Bring Out the Cartographer in You

Google Maps has expanded from just an online map system to an indispensible navigating system. In fact, newer Android phones come with their unique Google based GPS. Other uses, as you probably know, include getting directions, measuring distances, viewing satellite images, and, every once in a while, making a beautiful and creative short film like “Address is Approximate.” Still, if you’ve been a regular Google Maps user since the service’s inception, then you’re probably familiar with the occasional inaccuracies or glaring omissions that occur in some maps. Such problems used to be much more frequent in the early days of Google Maps, and are slowly becoming fewer as Google enhances the software. The cartographic data has been steadily improving since Google launched Google Map Maker in 2008.

Google Map Maker relies on a volunteer community to add features such as new locations, more venue details, and new or changed streets to its maps. This is especially helpful for Google because mapping information is not readily available everywhere. Map Maker is free, fairly simple to use, and open to the public.

Of course, though this may seem like an overtly philanthropic, egalitarian and democratizing act on Google’s part, by allowing the people who are most familiar with their own areas to contribute cartographic data, Google is saving itself a lot of time and resources. Instead of dedicating funds and advanced tech support to populate and repopulate maps with ever-changing local data ad infinitum, Google has chosen to let users do it themselves!

In many ways, this feature is almost like the Wikipedia side of Google, a side where everyone can contribute. One major difference between the two, though, is that Google is slightly stricter about its guidelines for editing. When users (called editors in the Map Maker sphere) make edits or suggestions, those changes need the approval of other members in the community. The more your edits get approved, the more merit you gain in the editing sphere, and the better your reputation, the easier it becomes for you to make changes. As you advance in the meritocracy of Google Map Maker, your edits will start to go live automatically.

The interface itself is very simple. You can tag buildings, create their outlines, and add roads. Ideally, you would do this based off the satellite image of the area you wish to edit. Next, you input some data about your newly added locale, and once you pass the approval process, you can celebrate your latest position as a Google cartographer.

If you are mainly interested in updating their own neighborhoods or specific areas, Google Map Maker allows you to subscribe to certain areas and monitor any edits that occur there. Overall, Google Map Maker is a great way to contribute your knowledge and have some fun on a rainy day. Be careful, though, it’s easy to spend endless hours editing once you’re hooked.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


How Connected Are We?

The great contribution of social networking platforms like Facebook and Twitter is connectivity, social connectivity, that is. Although Internet users everywhere used a variety of network services to connect, social networking sites would have us believe that we simply were not fulfilling our social potential. Many of its 800 million view Facebook  as a fundamental social networking tool. According to HighTalk, a third of all people with access to a network service are on Facebook. In many ways, teens and young users are growing up believing that Facebook is the ultimate social network service, but is Facebook actually helping us become more socially connected?

When it comes to connecting with old, lost friends and relatives, social network services are a simple and fast resource. In a matter of minutes, you can look through a friend’s friend list, locate a common friend, search his or her friend list, and voila, high school sweetheart found. In fact, for many people, websites that offer social network services are a great way to combine business and pleasure.

Clearly, Facebook  and other social networking sites offer us some form of connectivity—they allow us to be in each others’ lives much more prominently (often excessively). The real issue, though, is the kind of connectivity that Facebook enables, not its strength. In other words, do social network services actually enhance our social interactions and connections or do they merely create a delusional, alternate world in which we all roam with complete disregard for our privacy and Internet security, taking pride in the fact that we have 500 + friends?

Even in real life social settings, almost everyone is constantly checking Facebook via smartphones and other devices. If the purpose of social network services is to enhance our social connections, why do we still log-in when we are in perfectly healthy social settings?

Still, if you are convinced of the unparalleled rewards of social network services, consider the threats that these network services pose to users’ Internet security. Using social network services comes at a cost to Internet security. A previous blog discusses how vulnerable users’ Internet security can become when social network services are granted permission to share users’ data. Some people might try to defend social network services like Facebook  by claiming that users have the option to limit apps, hence protect their Internet security. However, the choice to block all third party apps is similar to the choice not to use a cell phone! Sure, no one is forcing you to allow Facebook apps access to your information, but without such apps, Facebook becomes boring and limited.

On the surface, sure, Facebook is making us more connected, but in reality, it is isolating us, increasing our addiction to life on the web, and constantly threatening our Internet security. Perhaps it’s not that great after all…

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Don’t Take the Facebook Lollipop

A new Facebook app has been circulating the web just in time for Halloween, and it’s offering a spooky reminder of how susceptible our Internet security is these days.

The app is among the most sophisticated to appear on Facebook. A blue lollipop with a razor inside it greets users. “Connect to Facebook” reads the button beneath it. Next comes the usual permission request that asks users to grant access to their private information, in other words, to put Internet security aside. A few seconds later, a video begins to play. The scene opens to a dark, musty looking corridor with creepy music playing in the background. A dirty, sweaty man sits behind an ancient computer. He logs into Facebook, but what shows up on the screen is not his account. It’s yours.

For the next minute or so, he clicks through your photos and reads your actual wall posts as he appears to be tormented by some kind of rage, anger, or jealousy. Before long, he types in your location, pulls up an online map, and heads to his car. He’s coming for you.

The scariest part of the video is that the crazed man out to get you doesn’t hack into a network service in order to breach your Internet security. Nor is he even part of your immediate network. He has access to your information because it’s all public. Even when you think you’re protecting your Internet security by adjusting your privacy settings, “Take This Lollipop” is an example of how we frequently opt out of maintaining high Internet security to allow apps Facebook access. Every time we allow an app access to our information, we are essentially signing a waiver to allow our Internet security to be breached.

To generate the video, users need to access it from an external website that connects to Facebook. This shows that Internet security problems extend past internal Facebook apps, especially since we now regularly link Facebook to external websites. We also access it through a variety of network services. In fact, threats to Internet security don’t even need advanced network services anymore. Even a creepy stalker in a basement that shows no evidence of a sophisticated network service can access your private information.

As Wi-Fi and 4G become standard in so many devices, accessing Facebook has become a right, not a privilege. We now expect to find Facebook embedded into smartphones and tablets. The increased reliance on Facebook for even the most basic communication brings with it a heightened threat to our Internet security.

The name of the app is in itself a message against the dangers of careless Internet security practices. Allowing Facebook apps to access your account may not be a primary threat to your network services the way virus are, but it is still a major threat to your personal and Internet security.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Balanced Social Networking?

What’s with all the ranting and raving in the social networking scene?  Facebook, Delicious, Pinboard, Diigo, Digg?   Why can my friends not contact me directly?  Who is deciding what is “appropriate” content?  Well, of course you have to be a digital social networker to care, and you have to be pretty involved in the social networking scene to really care.  Still, the cries are in the air from users all over the social networking world.  FOUL!  You are messing with OUR sites.  But what seems to be at stake here is not the social networking sites themselves, rather the Internet security issues surrounding them.

It does seem as if the administrators of the social networking sites have become more and more controlling, and this annoys their users who essentially have no say in the changes other than to complain after the fact.  Turns out though, that many of the changes say, Facebook, has made over time and most recently, have to do with Internet security and protecting their users from exploitation and inundation by spammers.  Social networking is a wonderful thing, and we want to feel free to express ourselves and communicate openly, but unless some basic Internet security is in place, social networking will become a huge mess of exploiters and spammers.

Internet security is always an important issue, and it is, frankly, a real problem when it comes to social networking.  Meantime, here we have these FREE, wonderful sources of keeping in touch with friends and families.  It seems as if the hassle of a few well-intentioned changes is tolerable given the alternative: little or no social networking and less Internet security.

As for the competition AMONG the social networking sites?  That seems like healthy competition.  And as for the Internet security concerns coming to light through the social networking sites, again, that’s healthy stuff.  We need to know what to protect ourselves from.

Rock on, social networking!

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Smartphone Users: Beware the Fraud

Fraud is not new to humanity.  Impostors and counterfeiters are as old as the idea of property.  The only new developments occur in the scams we see and the venues where they are attempted.  The birth of the World Wide Web created a digital world loaded with sensitive information where clever con artists could ply their trade.  Today, Internet security is paramount to protecting financial information from theft by nefarious individuals.  Everyone needs to consider seeking computer support to ensure effective Internet security.

Internet security as a way to identify and prevent fraud, started simply.  Over time, increased Internet security and the computer support it requires have become more and more a priority for people doing business on the Internet.  As Internet security becomes more sophisticated, so do the methods used to steal information.  Internet security, cybercrime, and the constant computer support needed to help in this conflict represent a daily battleground.  Personal users, out of concern and genuine fear, need the help of expert computer support, and they need continuous education in effective ways to maintain their own Internet security.  As an example, banks and private companies have begun offering identity protection to consumers worried about the safety of their transactions.

The most current and troubling threat to Internet security is the growing number of mobile web users.  Smartphones and tablets alter the digital landscape once again, and wireless options and expanded coverage are right alongside them.  Knowledgeable computer support is all the more important as threats to the Internet security of mobile users multiply due to the lack of anti-virus software on many devices.

Improving Internet security against mobile fraud continues as a top priority for commercial entities and the computer support personnel they employ.  Simple prevention is still the best solution to reduce the possibility of a cybercrime affecting you, and effective, reliable computer support is the key to peace of mind.  Take the time to install protective software on that smartphone.  Do your shopping while on the go, but wait until you get home to make that purchase.  The Internet security of your home machine is probably far superior to your mobile device.  A little education and proactive computer support can help prevent the huge hassles caused by a breach in your internet security.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Even Google Gets Hacked Sometimes

Hackers continue grabbing headlines with high profile attacks against the Internet security of governments and major corporations.  Hacktivists (hacker activists) attempting to make statements attacked various targets this year, again showing the importance of good virus removal and protection in a digital world.  Targets have ranged from PayPal and Visa to FBI associate Infragard, not always with obvious reasons.  Recent hacker arrests in the United States and Europe are attempts to combat the problem.   Google announced on Wednesday, July 20, they were the latest victim as hackers compromised their Internet security.

Read more »


Five Simple Steps to Secure Online Shopping

More shoppers buy items online everyday, with entire websites devoted to buying and selling. With the threats of identity theft and viruses, some shoppers still hesitate about making purchases over the internet.

Rescuecom offers five things you can go to protect yourself on and off the computer

  1. Keep the browser and anti-virus software updated. Anti-virus software will keep information stored on personal computers safe from online exposure. When entering purchase information, like credit card numbers, a pause in the processing can endanger the information. The order might be lost, and someone else might get a look at the card number.  An updated browser ensures smooth processing of information on websites, and reduces the risk of private information getting exposed.
  2. Know who you are dealing with. Stick to well-known stores or online marketplaces like Amazon.com. Legitimate businesses will help resolve an error or false charge and can refund the full amount sometimes. Business and marketplace websites also sometimes employ protective software to ensure customer privacy.
  3. Never give out passwords. Private information needs to remain private. The less information available online, the less shoppers need worry about security. Create usernames and passwords with numbers and symbols to make guessing harder.
  4. Use one card for transactions. Use only one credit card for online transactions. Shopping records are easier to follow and confirm on one card. Credit cards have to comply with Fair Credit Billing Act, so after reporting the theft of a card or a card number, the owner is only responsible for a small amount of the purchases. Each credit card company has the amount listed in the contract. More than one credit card used online not only increases the chance of stealing the numbers, card owners are also responsible for different amounts on each card. Using a check or bank card gives access to the entire account.
  5. Record it. Keep detailed records of online spending by choosing to print the receipt copies. Check card bills every month and be sure that all transactions appear on both the bill and the receipts. Report any items that do not match the receipts to the credit card company and the online store immediately.

Shoppers can easily protect personal computers, identities, and personal bank accounts. Rescuecom’s five steps let customer shop online securely.

Next Windows Almost Ready

Personal technology goes far beyond just a home computer. So, Microsoft designed an operating system modified to perform on many different personal devices. Windows 8, due to release next year, adapts to each product that runs it.

Rescuecom has five things customers need to know about the upcoming operating system.

The classic design remains.  The classic Windows operations still exits for anyone who needs it. The basic programs like Word and Excel present similarly to Windows 7. Private individuals and businesses that make and store crucial documents in these files can still create and save work the same as before without needing to learn a new format.

New applications appear. The tile interface, a set of mosaic-like boxes showing different applications, lets customers find needed items quickly and choose which tiles appear instantly. The tiles are large enough to reduce mistakes in opening tiles on touch screen products and new information is clearly visible. Tablet and smartphone users can find favorite websites, while computer users shorten searches for files.

Customizable adjustments are possible. Microsoft designed the Windows 8 system to allow individual customization. Users who need certain pieces of information regularly choose which applications appear on the home screen. The constant connection to a favorite news website appears above the file for last summer’s vacation pictures as soon as the device turns on, and either one opens at one touch.

Fewer resources are needed. The Windows 8 operating system’s memory design lets the programs work more efficiently. The ability to multi-task and run several programs at once increases, letting customers do more. Downloads and updates will not cause other programs to run more slowly.

Microsoft is ready for the future. The new focus on compatibility helps the system get ready for future technology. Microsoft’s design includes many facets of smartphones, tablets and netbooks, integrating needs for a variety of devices. Windows 8 adapts to products already, and will adapt to new products. Customers will not need to learn new systems as products appear.

Windows 8 mixes what customers like about the operating system with the needs of new applications and devices. Customers will choose how the system works, instead of the system controlling how the customer works.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


“Save the regret. Separate your e-mail accounts.”

Over the weekend, Epsilon notified millions of customers that the company had experienced a break-in and email addresses were stolen.  One consequence is that now it’s open season for phishing!  Now, instead of using bait to “catch” personal information, a more direct line of attack against your private information exists. 

You can avoid having your sensitive material, including your email address, exposed in this or some similar way.  Josh Kaplan, President of RESCUECOM, strongly recommends that you take immediate action to set up a separate e-mail address for all online transactions – and ONLY use this address for online transactions.  You should be aware that it is not safe to give your personal e-mail address used by your friends and family to any company. 

Even “reputable” companies with whom you may have been doing business for years should not be given your personal email address.  Companies regularly outsource their e-mail communication.  For example, companies such as Marriott, JPMorgan Chase, Walgreens, Capital One, and others contracted with Epsilon to manage their email information and send out e-mail blasts to customers.  Rather than directly overseeing the security of this information base, a third party is involved, thereby increasing the chances of compromised data.

Unfortunately, for many people, such as those affected by the recent data breaches at Epsilon, this warning may come too late.  Be sure that you set up a separate email address for those online business transactions today.  Consider setting up a new personal address as well if your existing address has already been compromised.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Microsoft Facing Uncertainty

It’s been a good news-bad news week so far for Microsoft.

On the positive side, the company announced a launch event for its Windows Phone 7 line of products, to be held on October 11.  Windows Phone 7 devices are expected to be released next month.

Within twenty four hours, Microsoft’s news had soured somewhat.  For the first time in years, Internet Explorer, Microsoft’s web browser, saw its market share drop below 50%.  At the same time, Google’s Chrome saw continued growth, tripling its market share from the same time last year. Read more »


© 1997-2024 RESCUECOM Corporation
Patented - Patent Numbers: 6,898,435, 8,832,424 and 9,477,488
Additional Patents Pending